General

  • Target

    2025-01-10_6d89d0b22551b60ff06b493dc3e2dd1e_smoke-loader_wapomi

  • Size

    208KB

  • Sample

    250110-qryxzavpgy

  • MD5

    6d89d0b22551b60ff06b493dc3e2dd1e

  • SHA1

    a1386619d46d694214919a9a1e44258bc000e20b

  • SHA256

    1798f38c0183e7055fd443d6073f21bbb2eb04bfe247cafec16b310081027e10

  • SHA512

    b675c0bdabb64499722172e4d708a64d44a2882ed3908676adaa0d78fbeb34b0a2c3fe56ab253ea3b9ebdd4f06b0b4a773ab3b5951a1821e0a19fb1152143217

  • SSDEEP

    3072:RxTrRfPa/DrTHQDgvkO7skKSro1Ykq6YoxmB9GCHASPy0Z+lzXWSSSmb9uEmBkCt:RxTrFeXbkvYFSm2G6wizXWS1mbPmyM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      2025-01-10_6d89d0b22551b60ff06b493dc3e2dd1e_smoke-loader_wapomi

    • Size

      208KB

    • MD5

      6d89d0b22551b60ff06b493dc3e2dd1e

    • SHA1

      a1386619d46d694214919a9a1e44258bc000e20b

    • SHA256

      1798f38c0183e7055fd443d6073f21bbb2eb04bfe247cafec16b310081027e10

    • SHA512

      b675c0bdabb64499722172e4d708a64d44a2882ed3908676adaa0d78fbeb34b0a2c3fe56ab253ea3b9ebdd4f06b0b4a773ab3b5951a1821e0a19fb1152143217

    • SSDEEP

      3072:RxTrRfPa/DrTHQDgvkO7skKSro1Ykq6YoxmB9GCHASPy0Z+lzXWSSSmb9uEmBkCt:RxTrFeXbkvYFSm2G6wizXWS1mbPmyM

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Bdaejec family

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.